2016-01-17 00:56:48 +00:00
|
|
|
<?php
|
2016-01-20 00:10:39 +00:00
|
|
|
/**
|
2016-01-20 21:05:16 +00:00
|
|
|
* Pterodactyl - Panel
|
2017-01-24 22:57:08 +00:00
|
|
|
* Copyright (c) 2015 - 2017 Dane Everitt <dane@daneeveritt.com>.
|
2016-01-20 00:10:39 +00:00
|
|
|
*
|
2016-01-20 20:56:40 +00:00
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
* of this software and associated documentation files (the "Software"), to deal
|
|
|
|
* in the Software without restriction, including without limitation the rights
|
|
|
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
* copies of the Software, and to permit persons to whom the Software is
|
|
|
|
* furnished to do so, subject to the following conditions:
|
2016-01-20 00:10:39 +00:00
|
|
|
*
|
2016-01-20 20:56:40 +00:00
|
|
|
* The above copyright notice and this permission notice shall be included in all
|
|
|
|
* copies or substantial portions of the Software.
|
2016-01-20 00:10:39 +00:00
|
|
|
*
|
2016-01-20 20:56:40 +00:00
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
|
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
|
|
* SOFTWARE.
|
2016-01-20 00:10:39 +00:00
|
|
|
*/
|
2016-12-07 22:46:38 +00:00
|
|
|
|
2016-01-17 00:56:48 +00:00
|
|
|
namespace Pterodactyl\Repositories;
|
|
|
|
|
|
|
|
use DB;
|
2016-12-07 22:46:38 +00:00
|
|
|
use Auth;
|
2016-01-17 01:11:31 +00:00
|
|
|
use Crypt;
|
2016-01-17 00:56:48 +00:00
|
|
|
use Validator;
|
|
|
|
use IPTools\Network;
|
|
|
|
use Pterodactyl\Models;
|
|
|
|
use Pterodactyl\Exceptions\DisplayException;
|
|
|
|
use Pterodactyl\Exceptions\DisplayValidationException;
|
|
|
|
|
|
|
|
class APIRepository
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Valid API permissions.
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected $permissions = [
|
2016-10-20 22:20:58 +00:00
|
|
|
'admin' => [
|
|
|
|
'*',
|
|
|
|
|
|
|
|
// User Management Routes
|
|
|
|
'users.list',
|
|
|
|
'users.create',
|
|
|
|
'users.view',
|
|
|
|
'users.update',
|
|
|
|
'users.delete',
|
|
|
|
|
|
|
|
// Server Manaement Routes
|
|
|
|
'servers.list',
|
|
|
|
'servers.create',
|
|
|
|
'servers.view',
|
|
|
|
'servers.config',
|
|
|
|
'servers.build',
|
|
|
|
'servers.suspend',
|
|
|
|
'servers.unsuspend',
|
|
|
|
'servers.delete',
|
|
|
|
|
|
|
|
// Node Management Routes
|
|
|
|
'nodes.list',
|
2017-02-11 01:26:38 +00:00
|
|
|
'nodes.view',
|
2016-10-20 22:20:58 +00:00
|
|
|
'nodes.create',
|
|
|
|
'nodes.allocations',
|
|
|
|
'nodes.delete',
|
|
|
|
|
|
|
|
// Service Routes
|
|
|
|
'services.list',
|
|
|
|
'services.view',
|
|
|
|
|
|
|
|
// Location Routes
|
|
|
|
'locations.list',
|
|
|
|
|
|
|
|
],
|
|
|
|
'user' => [
|
|
|
|
'*',
|
|
|
|
|
|
|
|
// Informational
|
|
|
|
'me',
|
|
|
|
|
|
|
|
// Server Control
|
|
|
|
'server',
|
|
|
|
'server.power',
|
|
|
|
],
|
2016-01-17 00:56:48 +00:00
|
|
|
];
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Holder for listing of allowed IPs when creating a new key.
|
|
|
|
* @var array
|
|
|
|
*/
|
|
|
|
protected $allowed = [];
|
|
|
|
|
2016-10-20 22:20:58 +00:00
|
|
|
protected $user;
|
|
|
|
|
2016-01-17 00:56:48 +00:00
|
|
|
/**
|
2016-12-07 22:46:38 +00:00
|
|
|
* Constructor.
|
2016-01-17 00:56:48 +00:00
|
|
|
*/
|
2016-10-20 22:20:58 +00:00
|
|
|
public function __construct(Models\User $user = null)
|
2016-01-17 00:56:48 +00:00
|
|
|
{
|
2016-10-20 22:20:58 +00:00
|
|
|
$this->user = is_null($user) ? Auth::user() : $user;
|
|
|
|
if (is_null($this->user)) {
|
2017-02-10 22:29:10 +00:00
|
|
|
throw new \Exception('Cannot access API Repository without passing a user to constructor.');
|
2016-10-20 22:20:58 +00:00
|
|
|
}
|
2016-01-17 00:56:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Create a New API Keypair on the system.
|
|
|
|
*
|
|
|
|
* @param array $data An array with a permissions and allowed_ips key.
|
|
|
|
*
|
|
|
|
* @throws Pterodactyl\Exceptions\DisplayException if there was an error that can be safely displayed to end-users.
|
|
|
|
* @throws Pterodactyl\Exceptions\DisplayValidationException if there was a validation error.
|
|
|
|
*
|
|
|
|
* @return string Returns the generated secret token.
|
|
|
|
*/
|
2016-12-12 19:30:57 +00:00
|
|
|
public function create(array $data)
|
2016-01-17 00:56:48 +00:00
|
|
|
{
|
|
|
|
$validator = Validator::make($data, [
|
2016-10-20 22:20:58 +00:00
|
|
|
'memo' => 'string|max:500',
|
|
|
|
'permissions' => 'sometimes|required|array',
|
2016-12-07 22:46:38 +00:00
|
|
|
'adminPermissions' => 'sometimes|required|array',
|
2016-01-17 00:56:48 +00:00
|
|
|
]);
|
|
|
|
|
2016-12-07 22:46:38 +00:00
|
|
|
$validator->after(function ($validator) use ($data) {
|
|
|
|
if (array_key_exists('allowed_ips', $data) && ! empty($data['allowed_ips'])) {
|
|
|
|
foreach (explode("\n", $data['allowed_ips']) as $ip) {
|
2016-01-17 00:56:48 +00:00
|
|
|
$ip = trim($ip);
|
|
|
|
try {
|
|
|
|
Network::parse($ip);
|
|
|
|
array_push($this->allowed, $ip);
|
|
|
|
} catch (\Exception $ex) {
|
|
|
|
$validator->errors()->add('allowed_ips', 'Could not parse IP <' . $ip . '> because it is in an invalid format.');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
// Run validator, throw catchable and displayable exception if it fails.
|
|
|
|
// Exception includes a JSON result of failed validation rules.
|
|
|
|
if ($validator->fails()) {
|
2017-03-16 23:30:04 +00:00
|
|
|
throw new DisplayValidationException(json_encode($validator->errors()));
|
2016-01-17 00:56:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
DB::beginTransaction();
|
2016-02-27 15:30:59 +00:00
|
|
|
try {
|
2016-10-20 22:20:58 +00:00
|
|
|
$secretKey = str_random(16) . '.' . str_random(7) . '.' . str_random(7);
|
2016-02-27 15:30:59 +00:00
|
|
|
$key = new Models\APIKey;
|
|
|
|
$key->fill([
|
2017-02-10 22:41:56 +00:00
|
|
|
'user_id' => $this->user->id,
|
2016-02-27 15:30:59 +00:00
|
|
|
'public' => str_random(16),
|
|
|
|
'secret' => Crypt::encrypt($secretKey),
|
2016-10-20 22:20:58 +00:00
|
|
|
'allowed_ips' => empty($this->allowed) ? null : json_encode($this->allowed),
|
|
|
|
'memo' => $data['memo'],
|
2016-12-07 22:46:38 +00:00
|
|
|
'expires_at' => null,
|
2016-02-27 15:30:59 +00:00
|
|
|
]);
|
|
|
|
$key->save();
|
|
|
|
|
2016-10-20 22:29:34 +00:00
|
|
|
$totalPermissions = 0;
|
|
|
|
if (isset($data['permissions'])) {
|
2016-12-07 22:46:38 +00:00
|
|
|
foreach ($data['permissions'] as $permNode) {
|
|
|
|
if (! strpos($permNode, ':')) {
|
|
|
|
continue;
|
|
|
|
}
|
2016-10-20 22:29:34 +00:00
|
|
|
|
|
|
|
list($toss, $permission) = explode(':', $permNode);
|
|
|
|
if (in_array($permission, $this->permissions['user'])) {
|
|
|
|
$totalPermissions++;
|
|
|
|
$model = new Models\APIPermission;
|
|
|
|
$model->fill([
|
|
|
|
'key_id' => $key->id,
|
2016-12-07 22:46:38 +00:00
|
|
|
'permission' => 'api.user.' . $permission,
|
2016-10-20 22:29:34 +00:00
|
|
|
]);
|
|
|
|
$model->save();
|
|
|
|
}
|
2016-02-27 15:30:59 +00:00
|
|
|
}
|
2016-01-17 00:56:48 +00:00
|
|
|
}
|
|
|
|
|
2017-02-10 22:29:10 +00:00
|
|
|
if ($this->user->isRootAdmin() && isset($data['adminPermissions'])) {
|
2016-12-07 22:46:38 +00:00
|
|
|
foreach ($data['adminPermissions'] as $permNode) {
|
|
|
|
if (! strpos($permNode, ':')) {
|
|
|
|
continue;
|
|
|
|
}
|
2016-10-20 22:20:58 +00:00
|
|
|
|
|
|
|
list($toss, $permission) = explode(':', $permNode);
|
2016-10-20 22:29:34 +00:00
|
|
|
if (in_array($permission, $this->permissions['admin'])) {
|
|
|
|
$totalPermissions++;
|
2016-10-20 22:20:58 +00:00
|
|
|
$model = new Models\APIPermission;
|
|
|
|
$model->fill([
|
|
|
|
'key_id' => $key->id,
|
2016-12-07 22:46:38 +00:00
|
|
|
'permission' => 'api.admin.' . $permission,
|
2016-10-20 22:20:58 +00:00
|
|
|
]);
|
|
|
|
$model->save();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-20 22:29:34 +00:00
|
|
|
if ($totalPermissions < 1) {
|
|
|
|
throw new DisplayException('No valid permissions were passed.');
|
|
|
|
}
|
|
|
|
|
2016-01-17 00:56:48 +00:00
|
|
|
DB::commit();
|
2016-12-07 22:46:38 +00:00
|
|
|
|
2016-01-17 01:11:31 +00:00
|
|
|
return $secretKey;
|
2016-01-17 00:56:48 +00:00
|
|
|
} catch (\Exception $ex) {
|
2016-10-20 22:20:58 +00:00
|
|
|
DB::rollBack();
|
2016-01-17 00:56:48 +00:00
|
|
|
throw $ex;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Revokes an API key and associated permissions.
|
|
|
|
*
|
|
|
|
* @param string $key The public key.
|
|
|
|
*
|
|
|
|
* @throws Illuminate\Database\Eloquent\ModelNotFoundException
|
|
|
|
*
|
|
|
|
* @return void
|
|
|
|
*/
|
2016-12-12 19:30:57 +00:00
|
|
|
public function revoke($key)
|
2016-01-17 00:56:48 +00:00
|
|
|
{
|
|
|
|
DB::beginTransaction();
|
|
|
|
|
2016-02-27 15:30:59 +00:00
|
|
|
try {
|
2017-02-16 17:57:48 +00:00
|
|
|
$model = Models\APIKey::with('permissions')->where('public', $key)->where('user_id', $this->user->id)->firstOrFail();
|
2017-02-19 03:57:50 +00:00
|
|
|
foreach ($model->permissions as &$permission) {
|
2017-02-16 17:57:48 +00:00
|
|
|
$permission->delete();
|
|
|
|
}
|
|
|
|
|
2016-02-27 15:30:59 +00:00
|
|
|
$model->delete();
|
2016-01-17 00:56:48 +00:00
|
|
|
|
2016-02-27 15:30:59 +00:00
|
|
|
DB::commit();
|
|
|
|
} catch (\Exception $ex) {
|
|
|
|
DB::rollBack();
|
|
|
|
throw $ex;
|
|
|
|
}
|
2016-01-17 00:56:48 +00:00
|
|
|
}
|
|
|
|
}
|